SWORD Extractor Pulling Workarounds out the Eventlog

Wouter van der Waal*, Inge van de Weerd, Hajo A. Reijers

*Corresponding author for this work

Research output: Contribution to journalConference articleAcademicpeer-review

Abstract

While workarounds can be used to improve processes, discovering them may be challenging. In earlier work, we showed that the Semi-automated WORkaround Detection (SWORD) framework can be used to detect workarounds in event data. Starting from an event log, the SWORD Extractor demonstrated in this work guides the user through all the necessary steps to find cases that may indicate workarounds, without requiring extensive technical experience. The tool’s design supports the implementation of additional patterns for future research.

Original languageEnglish
JournalCEUR Workshop Proceedings
Volume3783
Publication statusPublished - 8 Oct 2024
EventDoctoral Consortium and Demo Track 2024 at the International Conference on Process Mining, ICPM-D 2024 - Copenhagen, Denmark
Duration: 15 Oct 2024 → …

Bibliographical note

Publisher Copyright:
© 2024 Copyright for this paper by its authors.

Keywords

  • Automated detection
  • Business process analysis
  • Event logs
  • Process Mining
  • Workarounds

Fingerprint

Dive into the research topics of 'SWORD Extractor Pulling Workarounds out the Eventlog'. Together they form a unique fingerprint.

Cite this